SV-24383r1_rule
V-2423
DBMS software and configuration file monitoring
DG0050-ORACLE11
CAT II
10
Develop, document and implement procedures to monitor for unauthorized changes to DBMS software libraries, related software application libraries and configuration files.
If a third-party automated tool is not employed, an automated job that reports file information on the directories and files of interest and compares them to the baseline report for the same will meet the requirement.
File hashes or checksums should be used for comparisons as file dates may be manipulated by malicious users.
Review documented software and configuration monitoring procedures and implementation evidence to verify that monitoring of changes to database software libraries, related applications and configuration files is being performed weekly or more often.
Verify that a list of files and directories being monitored is complete.
If monitoring is not being performed weekly or more often, this is a Finding.
If implementation evidence is not complete, this is a Finding.
V-2423
False
DG0050-ORACLE11
Review documented software and configuration monitoring procedures and implementation evidence to verify that monitoring of changes to database software libraries, related applications and configuration files is being performed weekly or more often.
Verify that a list of files and directories being monitored is complete.
If monitoring is not being performed weekly or more often, this is a Finding.
If implementation evidence is not complete, this is a Finding.
I
Database Administrator
1368